ABSTRACT

This chapter examines the technology and techniques required to provide safe remote access to the use cases described. Establish remote access roles specific to applications. Remote users may require different levels of access based on job function. If you are employing virtual private network, the use of such roles can provide additional security. A point-to-point link provides a single, pre-established path from one location to another. Point-to-point lines, also referred to as “leased lines,” are usually leased from a carrier. Digital Subscriber Line (DSL) utilizes the existing telephone-cabling infrastructure and provides high bandwidth services to the home or organization. DSL uses a greater range of frequencies than ordinary dial-up services and, as a result, allow for a fast connection and higher bandwidth. Work with the assumption that a remote user can access only the components of the infrastructure he or she has been authorized to use.